Index: U
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: U
- UCD-SNMP library: 10.3.1. Using SNMP from Perl
 
- UID (see user ID)
 
- Universal Naming Convention (UNC): 2.2.2. Microsoft Windows NT/2000
 
- Unix
 
  
  - account creation/deletion, programs for: 3.3.2.1. Unix account creation and deletion routines
 
  
  - communicating with Microsoft SQL Server: 7.1. Interacting with an SQL Server from Perl
 
  
  - directories, hidden: 10.2.1. Local Signs of Peril
 
  
  - disk quotas on: 2.5. Manipulating Disk Quotas
 
  
  - file operations on, tracking: 4.4.2. Tracking Operations in Unix
 
  
  - filesystems: 2.2.1. Unix
 
    
    - /proc: 4.3.3. Using the /proc Filesystem
 
    
    - querying usage on: 2.6. Querying Filesystem Usage
 
    
    - traversing/walking: 2.3. Walking or Traversing the Filesystem
 
  
 
  
  - group ID (GID): 3.1.1. The Classic Unix Password File
 
  
  - host files: 5.1. Host Files
 
    
    - generating: 5.1.1. Generating Host Files
 
    
    - parsing: 5.1. Host Files
 
    
    - source control systems: 5.1.4. Incorporating a Source Code Control System
 
  
 
  
  - installing modules on: 1.5.1. Installing Modules on Unix
 
    - 1.5.1. Installing Modules on Unix
 
  
 
  
  - log files
 
    
    - analyzing: 9.5. Log Analysis
 
    
    - wtmp: 9.2. Binary Log Files
 
  
 
  
  - network operations on, tracking: 4.4.2. Tracking Operations in Unix
 
  
  - password file: 3.1.1. The Classic Unix Password File
 
  
  - passwords: 3.3.2.1. Unix account creation and deletion routines
 
  
  - privileges on, dropping: 1.6.2. Drop Your Privileges as Soon as Possible
 
  
  - process control: 4.3. Unix Process Control
 
  
  - process table, module for interface to: 4.3.4. Using the Proc::ProcessTable Module
 
  
  - processes, listing: 4.3. Unix Process Control
 
  
  - shells: 3.1.1. The Classic Unix Password File
 
  
  - user identity: 3.1. Unix User Identity
 
 
- unpack() function (Perl): 9.2.1. Using unpack( )
 
- Unsolicited Commercial Email (UCE) (see spam)
 
- UPDATE command (SQL): D.4. Changing Table Information
 
- USE statement (SQL): D.1. Creating /Deleting Databases and Tables
 
- user accounts
 
  
  - adding/removing: 3.3. Building an Account System to Manage Users
 
    
    - API calls for: 3.3.2.2. Windows NT/2000 account creation and deletion routines
 
    
    - modules for: 3.3.2.2. Windows NT/2000 account creation and deletion routines
 
  
 
  
  - logins, security and: 10.2.2. Finding Problematic Patterns
 
  
  - managing
 
    
    - with ADSI: 6.5.8. Working with Users via ADSI
 
    
    - process scripts for: 3.3.3. The Process Scripts
 
  
 
 
- user ID (UID)
 
  
  - Unix: 3.1.1. The Classic Unix Password File
 
  
  - Windows NT/2000: 3.2.2. NT/2000 User ID Numbers
 
 
- user input, security of: 1.6.3. Be Careful When Reading Data
 
- User Security Model (USM): E. The Twenty-Minute SNMP Tutorial
 
- users
 
  
  - identity of: 3. User Accounts
 
    
    - Unix: 3.1. Unix User Identity
 
    
    - Windows NT/2000: 3.2.1. NT/2000 User Identity Storage and Access
 
  
 
  
  - rights of, Windows NT/2000: 3.2.5. NT/2000 User Rights
 
 
- USM (User Security Model): E. The Twenty-Minute SNMP Tutorial
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.